Stuff from Exams I don't knw #4 Flashcards

1
Q

Serverless Architecture

A

serverless architecture refers to a cloud computing model where the cloud provider manages the infrastructure, automatically scaling resources as needed. In this model, users don’t need to manage or provision servers; instead, they focus on writing code and deploying functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Management Components

A

Risk assessment, risk response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VXLAN

A

Virtual Extensible LAN - encapsulation protocol enabling switch created network segments to be stretched across subnets and geographical space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which component of IPSec allows multiple concurrent vpns?

A

ISAKMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Familiarity

A

AKA ‘liking’ used as a social engineering principle. Attempts to exploit native trust in something familiar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Temporal Protections - encryption

A

Process that marks encrypted traffic as valid for only a limited amount of time.

Used to prevent replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is Security Governance related to Acquisitions, divestitures, and governance committees?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RFC 6749

A

OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scoping

A

Removing controls from a suggested baseline of controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Service Ticket

A

In Kerberos authentication, a service ticket is a time-limited credential provided by the Ticket Granting Server (TGS) after a user presents a valid Ticket Granting Ticket (TGT). This service ticket allows the user to access a specific network service, serving as proof of the user’s authenticated identity for the requested service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Ticket Granting Ticket?

A

Kerberos ticket that allows authenticated users to request access to network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Ticket Granting Server?

A

A Kerberos Ticket Granting Server (TGS) is a component in the Kerberos authentication system that issues service tickets to users after they have successfully obtained a Ticket Granting Ticket (TGT) from the Authentication Server (AS). The TGS plays a key role in facilitating secure access to various services within a network by providing users with tickets that authenticate their identity to those servic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Randomized masking

A

An anonymization technique. When done correctly cannot be reversed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What best describes a Service Account?

A

Used to run applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wired Extension

A

A single added WAP used to extend a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise Extension

A

Topology where wireless network is designed to support large envioronment with one SSID, numerous APs. Ofeten used to extend a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What port is used for SQL

A

1433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IR Mitigate phase

A

Contain Damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IR Recovery phase

A

Restore system back to original state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IR Remediation phase

A

Root Cause Analysis, patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IR Response phase

A

Gather the IR team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Software test coverage that verifies every if statement in code has been executed under all ‘if’ and ‘else’ conditions?

A

Branch coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Split-response attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cache Poisoning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DCE and IDL??

A

DCOM, RPC, CORBA….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

WiFi uses _______ for collision detection

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TM symbol vs R symbol

A

TM is used to indicate a trademark that isn’t yet registered with USPTO

R is a Registered Trademark

28
Q

What is a Web Development Framework?

A

A Code package used to provide many of the functions a webpage will need, such as Angular Js, Flask, Django, Symfony, Express.

29
Q

OIDC/OpenD Connect

A

Uses the RFC6749 OAuth framework, but is maintained by the openid foundation.

30
Q

Is HVAC considered a security control?

A

Yes, because it cPontrols temperature in server rooms.

31
Q

What is the primary goal of Asset Inventory Managemetn

A

Prevent Losses.

32
Q

ECDSA Elliptic Curve Digital Signature Alg.

A

Elliptic Curve Cryptography when used to produce digital signatures.

33
Q

Distributed Data Model

A

Data is stored in more than one DB, but is still logically connected. User perceives the DB as a single entity, even though it comprises numerous parts over a network.

34
Q

Branch Coverage

A

Evaluates that every ‘if’ statement has been executed.

35
Q

What does Baselining provide?

A

a minimum level of security. Meant to be a starting point, does not ensure maximum security.

36
Q

Should you clear and purge on tapes?

A

You can, but this will reduce the lifetime of the tapes. Not the best option.

37
Q

TCP Wrapper

A

An application that can serve as a basic firewall by restricting access based on user IDs or system IDs. (I think) typically only used in Linux and Unix environments

38
Q

Kerberos Port

A

88

39
Q

TKIP

A

Introduced with WPA as a replacement for weaker WEP encryptions. Now considered deprecated.

40
Q

SAE

A

Introduced in WPA3, simultaneous authentication of equals. Removes the need for a key exchange.

41
Q

OpenID Connect and JSON tokens, what is the relationship?

A

JSON Tokens used to pass information back and forth between entities.

42
Q

Fileless Malware

A

Malware that leaves no trace.

43
Q

SCAP - CCE? Is CCE a thing?

A

Yes - stands for Common Configuration Enumeration. A Naming system for system configuration issues.

44
Q

VMS Vendor Management System

A

Vendor Management System: Assists with mgmt and procurement of staffing services, hardware, software, and other needed products/services.

45
Q

OFDM, DSS, FHSS??

A
46
Q

DNSSEC and PKI?

A

DNSSEC uses certs to perform mutual authentication of peer DNS servers.

47
Q

Embedded System?

A

Is a computer implemented as part of a larger system. Typically designed around a limited set of specific functions in relation to the larger product it is a component of.

48
Q

ISA

A

ISA: Interconnection Security Agreement

formal declaration of the security stance, risk, and technical requirements to link two organizations’ IT infrastructures.

49
Q

Audit vs Assessment

A
50
Q

Can a WAF be used in lieu of yearly web vuln. assessments in PCI??

A

Yes

51
Q

Does Configuration management account for changes in already-running systems?

A

NO - it’s only used to ensure systems are similarly deployed.

52
Q

Final step of Fagan Inspection?

A

Follow-up

53
Q

Can a Configuration Management System assist in Hardware Asset Mgmt?

A

Yes

54
Q

BPA

A

Business Partners Agreement: Contract between two entities dictating the terms of the business relationship.

55
Q

SLR

A

Service Level Agreement:

Statement of expectations of service and performance from the product or service of a vendor.

56
Q

What is DRM geared towards protecting?

A

Copyrighted materials

57
Q

Tokenization vs Psedonymization

A

Token - third party holds mappings

Pseudonymization - internal DB hold mappings

58
Q

BiometricsL: one-to-many

A

Identification

59
Q

Biometrics: one-to-one

A

authentication

60
Q

Tunnel Mode VPN connects ____ to ____?

A

Networks to Networks, or Hosts to Networks

61
Q

Transport Mode VPN connects ____ to ____?

A

Hosts to hosts.

62
Q

DB - Concurrency?

A

Concurrency locks the data elements while a change is processing, so that a second operation cannot be run against the data at the same time.

63
Q

Risk Assignment

A

Synonymous with Risk Transference (i.e cyberinsurance)

64
Q

Is a VPN an example of network segmentation?

A

NO

65
Q

Cloud Security Policy - CSP

A

Rules how the provider provides service.

66
Q

Software - statement coverage

A

Test to verify that every line of code is executed.

67
Q

FHSS

A

Frequency Hopping Spread Spectrum (FHSS) is a transmission technology in which the data signal is modulated by a narrowband carrier signal which changes frequency (“hops”) over a wide band of frequencies.